Jump to content

Search the Community

Showing results for tags 'NSE6_FML-6.4 Exam'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Announcement
    • WE ARE BACK!!! -- ONLINE
  • TECHNICAL DISCUSSION (No Request Section).
    • CISCO SYSTEMS
    • JUNIPER NETWORKS
    • AWS
    • Microsoft
    • FORTINET
    • COMPTIA
    • Linux
  • TRAINING OFFERS & REQUESTS
    • CISCO SYSTEMS
    • JUNIPER NETWORKS
    • AWS
    • Microsoft
    • COMPTIA
    • LINUX
  • CYBERSECURITY - TRAINING OFFERS & REQUESTS
    • CYBERSECURITY SHARES
  • FINANCE & ACCOUNTS - TRAINING OFFERS & REQUESTS
    • FINANCE & ACCOUNTING SHARES
  • Other Certifications (Share & Request)
    • OTHER SHARES
  • Vouchers
    • Vouchers
  • Job Opportunities
    • Jobs
  • Entertainment & OTT Platform
    • Entertainment & OTT Platform
  • Complain & Suggestions
    • Complain & Suggestions

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 1 result

  1. Hello! The FortiMail 6.4 NSE6_FML-6.4 exam updated recently with many NEW questions. NEW QUESTION 1 An administrator sees that an excessive amount of storage space on a FortiMail device is being used up by quarantine accounts for invalid users. The FortiMail is operating in transparent mode. Which two FortiMail features can the administrator configure to tackle this issue? (Choose two.) A. Automatic removal of quarantine accounts. B. Recipient address verification. C. Bounce address tag verification. D. Sender address rate control. Answer: AD Explanation: [Hidden Content] (page 322-323) NEW QUESTION 2 Which three statements about SMTPS and SMTP over TLS are true? (Choose three.) A. SMTP over TLS connections are entirely encrypted and initiated on port 465. B. SMTPS encrypts the identities of both the sender and receiver. C. The STARTTLS command is used to initiate SMTP over TLS. D. SMTPS encrypts only the body of the email message. E. SMTPS connections are initiated on port 465. Answer: BCE Explanation: [Hidden Content] NEW QUESTION 3 Which firmware upgrade method for an active-passive HA cluster ensures service outage is minimal, and there are no unnecessary failovers? A. Break the cluster, upgrade the units independently, and then form the cluster. B. Upgrade both units at the same time. C. Upgrade the standby unit, and then upgrade the active unit. D. Upgrade the active unit, which will upgrade the standby unit automatically. Answer: B Explanation: [Hidden Content] NEW QUESTION 4 If you are using the built-in MTA to process email in transparent mode, which two statements about FortiMail behavior are true? (Choose two.) A. MUAs need to be configured to connect to the built-in MTA to send email. B. If you disable the built-in MTA, FortiMail will use its transparent proxies to deliver email. C. FortiMail can queue undeliverable messages and generate DSNs. D. FortiMail ignores the destination set by the sender, and uses its own MX record lookup to deliver email. Answer: CD NEW QUESTION 5 Which two CLI commands, if executed, will erase all data on the log disk partition? (Choose two.) A. execute formatmaildisk B. execute formatmaildisk_backup C. execute formatlogdisk D. execute partitionlogdisk 40 Answer: CD Explanation: [Hidden Content] [Hidden Content] NEW QUESTION 6 Which FortiMail option removes embedded code components in Microsoft Word, while maintaining the original file format? A. Behavior analysis. B. Impersonation analysis. C. Content disarm and reconstruction. D. Header analysis. Answer: C Explanation: [Hidden Content] (page 435) NEW QUESTION 7 While testing outbound MTA functionality, an administrator discovers that all outbound email is being processed using policy IDs 1:2:0. Which two reasons explain why the last policy ID value is 0? (Choose two.) A. Outbound email is being rejected. B. IP policy ID 2 has the exclusive flag set. C. There are no outgoing recipient policies configured. D. There are no access delivery rules configured for outbound email. Answer: CD NEW QUESTION 8 An organization has different groups of users with different needs in email functionality, such as address book access, mobile device access, email retention periods, and disk quotas. Which FortiMail feature specific to server mode can be used to accomplish this? A. Resource profiles. B. Domain-level service settings. C. Access profiles. D. Address book management options. Answer: A NEW QUESTION 9 A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks. What option can the administrator configure to prevent these types of attacks? A. Impersonation analysis. B. Bounce tag verification. C. Content disarm and reconstruction. D. Dictionary profile with predefined smart identifiers. Answer: A NEW QUESTION 10 Which two features are available when you enable HA centralized monitoring on FortiMail? (Choose two.) A. Policy configuration changes of all cluster members from the primary device. B. Firmware update of all cluster members from the primary device. C. Cross-device log searches across all cluster members from the primary device. D. Mail statistics of all cluster members on the primary device. Answer: CD ...... For more new FortiMail 6.4 NSE6_FML-6.4 exam questions, contact me by visiting my profile page ("About me" tab) please. Good luck!
×
×
  • Create New...